Search Header Logo

REVISION

Authored by ABDIRASHID GUHAD

Information Technology (IT)

6th Grade

Used 1+ times

REVISION
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.     State any two ways in which computers can be protected from viruses.   

a)    _____________________

b)    _____________________

 

Install a firewall
Use outdated software
Disable all security features
a) Use antivirus software b) Keep software updated

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1.     State three ways in which viruses spread to computer.

a)    _____________________

b)    _____________________

c)     _____________________

a) Email attachments b) Infected software downloads c) Removable media (e.g., USB drives)
Social media posts
Network cables
Cloud storage services

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

     Define the following terms used in ICT.

 

a.     Cybercrime: ________________________________________________

 

b.     Hacking: ___________________________________________________

 

c.     Software piracy: _____________________________________________________

 

a. Cybercrime: A type of online shopping.
b. Hacking: Creating software applications.
c. Software piracy: Selling software at a discount.
a. Cybercrime: Illegal activities conducted via the internet or involving computer systems. b. Hacking: Exploiting vulnerabilities in computer systems to gain unauthorized access. c. Software piracy: Unauthorized copying, distribution, or use of software.

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Which law of a computer crime should be enforced to someone who takes something from someone without his/her permission?

Evaluate responses using AI:

OFF

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  List three health risk solutions for the excessive and improper use of computer.

 

a)    _____________________

b)    _____________________

c)     _____________________

 

Increase screen brightness
Use a standing desk all day
Ignore eye strain symptoms

a) Take regular breaks

b) Use ergonomic furniture

c) Engage in physical activity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Outline any five computer rules that you know.

a)    _____________________

b)    _____________________

c)     _____________________

d)    _____________________

e)    _____________________

Always share your passwords with friends.

a) Always save your work frequently.

b) Keep your software updated.

c) Use strong passwords and change them regularly.

d) Avoid clicking on unknown links or attachments.

e) Back up your data regularly.

Use the same password for all accounts.
Ignore software updates when prompted.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

State and explain the three laws that have been enforced to protect people from computer crimes.

   

a)    _____________________

 

b)    _____________________

 

c)     _____________________

a. Data protection Act:To ensure that people know how personal information about them are being used.
b. Copyright Act:

To protect the work of people from being copied by others.

c. Cybercrime Act:

To protect the computer system from unauthorized access or use by a person.


Cybersecurity Enhancement Act
Children's Online Privacy Protection Act (COPPA)
Computer Security Act

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?